SlideShare a Scribd company logo
‘’BIT DEFENDER ANTIVIRUS’’
PRESENTED BY:
M.SAAD FARMAN (UW-14-CS-BS-
138)
USAMA TANVEER (UOW-15-CS-BS-022)
PRSEENTED TO:
MAM.SADAF ANWAR
CLASS. BS(cs) 4TH A
Intro of Bit DefenderAntivirus:
 Bitdefender antivirus scan all the computer data dectect the virus and fix. It doesn’t
harm the system.
 When we use the computer Interment ads are irritating the user, ads are blocking,
copying and deleting your personal data.
 Bitdefender can block this kind of advertisement and protect system from this
Trojan virus.
 Usb and other data cables are sometimes harmful for the pc, because when they
connect with system they caries virus.
 Bitdefender antivirus first scan the virus and then give permission to connect with
computer
 Some type of bugs are very dangerous for the computer
 Bitdefender antivirus also used to detect the bugs from cache memory and fix the
computer bugs that harms the data.
Update
System
Protection
Real Time
ptotection
Web
Protection
Unsafe
URL FileScan
Safe
State diagram:
Activity
Diagram:
;
Update
softwareUpdate
setting
Software
update
Update
automatically
Update
Manually
update time
Scan virus
Time
Time
scheduling
Scan
manually
scan
atutomaticall
y
Set scan time
Class Diagram
Bit Defender
+Anti Spyware
+Anti worm
+AntiMalware
+Secure Network
+Sacan Virus
+Malware detection
+Update
User
ID
Name
DOB
+Scan
+Update
Scanning
+Scan Running apps
+Critical Locatiion
+Entire System
Secure Network
Anti Malware
Bugs Detect
Anti Spyware
Detect virus
Fix virus
Sequence Diagram:
User
Main
interface Antivirus Data base
scan file start scan
show analysis
dell infectted files Delete File Update database
Data flow
diagram: Input Files
Clean Files
Scan Cache
Memory Quick
Scan
System
protection
Perform
Analysis
Virus
detection
Update
Datbase
Component Diagram:
Antivirus
System scan
Real Time
Protection
Wallet
Virus DB
<<database>>
Wallet DB
<<Database>>
access
Use Case Diagram:
Input
Files
Clean
file
Perform
analysis
Quick
scan
Advance
analysis
See
Infected
Files
Update
Virus
Database
Save file
infacted
select files and
Report to
analysis
<<include>>
<<extend>><<include>>
<<include>>
<<extend>>
USER
Steps Test Step Test Data Expected Results Actual Result Status
1 Pass
2 Pass
3 Pass
Testing module: Input files Test By: Usama Tanveer
Test Case ID: OO-12 Test Date: 31-5-2017
Test priority: 1 Test Execution By: M. SAAD
Description: Input file module perform selection of
file to perform scanning and detect bugs or errors.

 Tap on
“ Input files”
Press “yes button”
press” no button”
Test Execution date: 10-5-2017
Error should be errors successfully
Find found and fixed
Should Back back to initial stage
to initial state
Testing Module: Perform Analysis Test By: Usama Tanveer
Test Case ID: OO-12 Test Date: 31-5-2017
Teat Priority: 2 Test Execution By: M. SAAD
Description: Quick scan and advance analysis.
Precondition selected files and report to analysis.
Test Execution date: 10-5-2017
Steps Test Step Test Data Expected Results Actual Result Status
1  Tap on
“ Input files”
Pass
2
Press “yes button”
Should give
report of analysis
scanning is done Pass
3 press” no button” Back previous
position
Show previous
position
Pass
Steps Test Step Test Data Expected Results Actual Result Status
1 Pass
2 Pass
3 Pass
Test Module: Clean files Test By: Usama Tanveer
Test Case ID: OO-13 Test Date: 31-5-2017
Test priority:3 Test Execution By: M. SAAD
Description: clean junk files and remove ADS
Tap on
“ Clean Files”
Press “yes button”
press” no button”
.
Test Execution date: 10-5-2017
clean junk and remove ads and
Detect bugs clean pc
From cache mem
Testing Module: Update virus data base. Test By: Usama Tanveer
Test Case ID: OO-14 Test Date: 10-5-2017
Module Name: 4 Test Execution By: M. SAAD
Description: for cleaning infected file software must be
update.
Pre condition is user must be install update version.
Test Execution date: 10-5-2017
Uptadate database
should detect all
viruses
Steps Test Step Test Data Expected Results Actual Result Status
1 Tap on
“Update data base”
Aware us about the
upcoming
Viruses
Pass
2
Press “yes button”
Detect bugs Pass
3
press” no button”
No detection back to
initial stage
Pass
Bit defender antivirus UML diagrams in software engineering

More Related Content

What's hot

Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
MG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENTMG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENT
Kathirvel Ayyaswamy
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Software testing
Software testing Software testing
Software testing
Kunal Prajapati
 
Seminar on Software Testing
Seminar on Software TestingSeminar on Software Testing
Seminar on Software Testing
Beat Fluri
 
Operating system services 9
Operating system services 9Operating system services 9
Operating system services 9
myrajendra
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Atm system_project
Atm system_projectAtm system_project
Atm system_project
PRasad Bhamre
 
Pegasus, A spyware
Pegasus, A spywarePegasus, A spyware
Pegasus, A spyware
Manash Kumar Mondal
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating system
DeepikaT13
 
Passport Automation System
Passport Automation SystemPassport Automation System
Passport Automation System
Megha Sahu
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Basic web security model
Basic web security modelBasic web security model
Basic web security model
G Prachi
 
Unit testing
Unit testing Unit testing
Unit testing
Mani Kanth
 
Spm unit 3
Spm unit 3Spm unit 3
Spm unit 3
sweetyammu
 
Compiler design lab programs
Compiler design lab programs Compiler design lab programs
Compiler design lab programs
Guru Janbheshver University, Hisar
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
Dilip Prajapati
 
Implementation issues software engineering
Implementation issues software engineeringImplementation issues software engineering
Implementation issues software engineering
rishi ram khanal
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
Software Testing Fundamentals
Software Testing FundamentalsSoftware Testing Fundamentals
Software Testing Fundamentals
Chankey Pathak
 

What's hot (20)

Malicious software
Malicious softwareMalicious software
Malicious software
 
MG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENTMG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENT
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Software testing
Software testing Software testing
Software testing
 
Seminar on Software Testing
Seminar on Software TestingSeminar on Software Testing
Seminar on Software Testing
 
Operating system services 9
Operating system services 9Operating system services 9
Operating system services 9
 
Malware
MalwareMalware
Malware
 
Atm system_project
Atm system_projectAtm system_project
Atm system_project
 
Pegasus, A spyware
Pegasus, A spywarePegasus, A spyware
Pegasus, A spyware
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating system
 
Passport Automation System
Passport Automation SystemPassport Automation System
Passport Automation System
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Basic web security model
Basic web security modelBasic web security model
Basic web security model
 
Unit testing
Unit testing Unit testing
Unit testing
 
Spm unit 3
Spm unit 3Spm unit 3
Spm unit 3
 
Compiler design lab programs
Compiler design lab programs Compiler design lab programs
Compiler design lab programs
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
Implementation issues software engineering
Implementation issues software engineeringImplementation issues software engineering
Implementation issues software engineering
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Software Testing Fundamentals
Software Testing FundamentalsSoftware Testing Fundamentals
Software Testing Fundamentals
 

Similar to Bit defender antivirus UML diagrams in software engineering

so big 22
so big 22so big 22
so big 22
cainem
 
so big ppt
so big pptso big ppt
so big ppt
cainem
 
so big
so bigso big
so big
cainem
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
Jermund Ottermo
 
Avc per 201304_en
Avc per 201304_enAvc per 201304_en
Avc per 201304_en
Anatoliy Tkachev
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
Doryan Mathos
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)
Doryan Mathos
 
Performance dec 2010
Performance dec 2010Performance dec 2010
Performance dec 2010
nuttakorn nakkerd
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
Andrey Apuhtin
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
qacaybagirovv
 
Test Strategies & Common Mistakes
Test Strategies & Common MistakesTest Strategies & Common Mistakes
Test Strategies & Common Mistakes
frisksoftware
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUS
fauscha
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
The Toolbox, Inc.
 
Antivirus
AntivirusAntivirus
Antivirus
ava & araf co.
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance Test
Herbert Rodriguez
 
How to schedule Avast boot-time scan?
How to schedule Avast boot-time scan?How to schedule Avast boot-time scan?
How to schedule Avast boot-time scan?
Antivirus Support Helpline Canada
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Abir Almaqrashi
 
Errorssolvingppt
ErrorssolvingpptErrorssolvingppt
Errorssolvingppt
john wick
 
Errorssolvingppt
ErrorssolvingpptErrorssolvingppt
Errorssolvingppt
john wick
 
Avc prot 2013a_en
Avc prot 2013a_enAvc prot 2013a_en
Avc prot 2013a_en
Anatoliy Tkachev
 

Similar to Bit defender antivirus UML diagrams in software engineering (20)

so big 22
so big 22so big 22
so big 22
 
so big ppt
so big pptso big ppt
so big ppt
 
so big
so bigso big
so big
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Avc per 201304_en
Avc per 201304_enAvc per 201304_en
Avc per 201304_en
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)
 
Performance dec 2010
Performance dec 2010Performance dec 2010
Performance dec 2010
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
Test Strategies & Common Mistakes
Test Strategies & Common MistakesTest Strategies & Common Mistakes
Test Strategies & Common Mistakes
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUS
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
Antivirus
AntivirusAntivirus
Antivirus
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance Test
 
How to schedule Avast boot-time scan?
How to schedule Avast boot-time scan?How to schedule Avast boot-time scan?
How to schedule Avast boot-time scan?
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Errorssolvingppt
ErrorssolvingpptErrorssolvingppt
Errorssolvingppt
 
Errorssolvingppt
ErrorssolvingpptErrorssolvingppt
Errorssolvingppt
 
Avc prot 2013a_en
Avc prot 2013a_enAvc prot 2013a_en
Avc prot 2013a_en
 

Recently uploaded

DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 

Bit defender antivirus UML diagrams in software engineering

  • 1.
  • 2. ‘’BIT DEFENDER ANTIVIRUS’’ PRESENTED BY: M.SAAD FARMAN (UW-14-CS-BS- 138) USAMA TANVEER (UOW-15-CS-BS-022) PRSEENTED TO: MAM.SADAF ANWAR CLASS. BS(cs) 4TH A
  • 3. Intro of Bit DefenderAntivirus:  Bitdefender antivirus scan all the computer data dectect the virus and fix. It doesn’t harm the system.  When we use the computer Interment ads are irritating the user, ads are blocking, copying and deleting your personal data.  Bitdefender can block this kind of advertisement and protect system from this Trojan virus.  Usb and other data cables are sometimes harmful for the pc, because when they connect with system they caries virus.  Bitdefender antivirus first scan the virus and then give permission to connect with computer  Some type of bugs are very dangerous for the computer  Bitdefender antivirus also used to detect the bugs from cache memory and fix the computer bugs that harms the data.
  • 6. Class Diagram Bit Defender +Anti Spyware +Anti worm +AntiMalware +Secure Network +Sacan Virus +Malware detection +Update User ID Name DOB +Scan +Update Scanning +Scan Running apps +Critical Locatiion +Entire System Secure Network Anti Malware Bugs Detect Anti Spyware Detect virus Fix virus
  • 7. Sequence Diagram: User Main interface Antivirus Data base scan file start scan show analysis dell infectted files Delete File Update database
  • 8. Data flow diagram: Input Files Clean Files Scan Cache Memory Quick Scan System protection Perform Analysis Virus detection Update Datbase
  • 9. Component Diagram: Antivirus System scan Real Time Protection Wallet Virus DB <<database>> Wallet DB <<Database>> access
  • 10. Use Case Diagram: Input Files Clean file Perform analysis Quick scan Advance analysis See Infected Files Update Virus Database Save file infacted select files and Report to analysis <<include>> <<extend>><<include>> <<include>> <<extend>> USER
  • 11. Steps Test Step Test Data Expected Results Actual Result Status 1 Pass 2 Pass 3 Pass Testing module: Input files Test By: Usama Tanveer Test Case ID: OO-12 Test Date: 31-5-2017 Test priority: 1 Test Execution By: M. SAAD Description: Input file module perform selection of file to perform scanning and detect bugs or errors.   Tap on “ Input files” Press “yes button” press” no button” Test Execution date: 10-5-2017 Error should be errors successfully Find found and fixed Should Back back to initial stage to initial state
  • 12. Testing Module: Perform Analysis Test By: Usama Tanveer Test Case ID: OO-12 Test Date: 31-5-2017 Teat Priority: 2 Test Execution By: M. SAAD Description: Quick scan and advance analysis. Precondition selected files and report to analysis. Test Execution date: 10-5-2017 Steps Test Step Test Data Expected Results Actual Result Status 1  Tap on “ Input files” Pass 2 Press “yes button” Should give report of analysis scanning is done Pass 3 press” no button” Back previous position Show previous position Pass
  • 13. Steps Test Step Test Data Expected Results Actual Result Status 1 Pass 2 Pass 3 Pass Test Module: Clean files Test By: Usama Tanveer Test Case ID: OO-13 Test Date: 31-5-2017 Test priority:3 Test Execution By: M. SAAD Description: clean junk files and remove ADS Tap on “ Clean Files” Press “yes button” press” no button” . Test Execution date: 10-5-2017 clean junk and remove ads and Detect bugs clean pc From cache mem
  • 14. Testing Module: Update virus data base. Test By: Usama Tanveer Test Case ID: OO-14 Test Date: 10-5-2017 Module Name: 4 Test Execution By: M. SAAD Description: for cleaning infected file software must be update. Pre condition is user must be install update version. Test Execution date: 10-5-2017 Uptadate database should detect all viruses Steps Test Step Test Data Expected Results Actual Result Status 1 Tap on “Update data base” Aware us about the upcoming Viruses Pass 2 Press “yes button” Detect bugs Pass 3 press” no button” No detection back to initial stage Pass